Actions
Bug #15597
closedUpdate relayd dependencies to fix RUSTSEC-2019-0013
Status:
Released
Priority:
N/A
Assignee:
Category:
Relay server or API
Target version:
Pull Request:
Severity:
UX impact:
User visibility:
Effort required:
Priority:
0
Name check:
To do
Fix check:
To do
Regression:
Description
cd relayd && cargo audit Fetching advisory database from `https://github.com/RustSec/advisory-db.git` Loaded 34 security advisories (from /home/jenkins/.cargo/advisory-db) Scanning Cargo.lock for vulnerabilities (273 crate dependencies) error: Vulnerable crates found! ID: RUSTSEC-2019-0013 Crate: spin Version: 0.5.1 Date: 2019-08-27 URL: https://github.com/mvdnes/spin-rs/issues/65 Title: Wrong memory orderings in RwLock potentially violates mutual exclusion Solution: upgrade to: >= 0.5.2
Updated by Alexis Mousset about 5 years ago
- Status changed from New to In progress
- Assignee set to Alexis Mousset
Updated by Alexis Mousset about 5 years ago
- Status changed from In progress to Pending technical review
- Assignee changed from Alexis Mousset to Benoît PECCATTE
- Pull Request set to https://github.com/Normation/rudder/pull/2433
Updated by Alexis Mousset about 5 years ago
- Status changed from Pending technical review to Pending release
Applied in changeset rudder|3a459709e805f630d279d50d78a256326f80f61e.
Updated by Vincent MEMBRÉ about 5 years ago
- Status changed from Pending release to Released
This bug has been fixed in Rudder 6.0.0~beta1 which was released today.
Actions